Ploutus ATM Malware Case Study: Automated Deobfuscation of a Strongly Obfuscated .NET Binary
2021-11-14 23:17:42 Author: www.reddit.com(查看原文) 阅读量:46 收藏

I'm surprised that they did not use available tools to defeat NET Reactor. Perhaps they wanted to perform the deobfuscation in the most static way possible?

The whole body encryption that they mention could be defeated by dumping the bytes after compileMethod is reached.

The other challenges that NET Reactor presents are relatively trivial considering that they barely add any CFG complexity to their method obfuscation techniques.

Either way, it's a cool blog post and I'd love to see more examples from CS in the future.


文章来源: https://www.reddit.com/r/ReverseEngineering/comments/qtqpv3/ploutus_atm_malware_case_study_automated/
如有侵权请联系:admin#unsafe.sh